补牙用什么材料最好| 醋泡脚有什么好处和坏处| 什么是矿物质| itp是什么意思| 晚上夜尿多吃什么药| 始终如一是什么意思| 热伤风吃什么感冒药| 额头长痘什么原因| 泉字五行属什么| 白细胞低吃什么食物好| 胆囊结石需要注意什么| 芙字五行属什么| 胃出血有什么症状| 赘肉是什么意思| 乳腺疼挂什么科| 公安局局长是什么级别| 癫痫是什么| 孕妇为什么会便秘| 青蛙吃什么| 水痘擦什么药膏好得快| 坚果都有什么| 用盐洗脸有什么好处| visa卡是什么| 什么龙什么凤| 同房出血要做什么检查| 射手什么象星座| 好强的女人是什么性格| 人类的祖先是什么| 军分区司令是什么级别| 宫颈纳氏腺囊肿是什么意思| 千年等一回是什么生肖| bc什么意思| 气血两亏是什么意思| ellesse是什么牌子| 身上泡疹是什么引起的| 长期喝蜂蜜有什么好处| 榴莲壳有什么用| 无住生心是什么意思| 什么叫尊重| 化学阉割是什么| 坐地能吸土是什么意思| 菠萝和凤梨有什么区别| 不感冒什么意思| 蜂蜜变质是什么样子| 败血症是什么病| 舌苔发黄是什么症状| 女人缺少雌激素吃什么| 尿蛋白质阳性什么意思| 坎坷人生是什么生肖| 5月20号是什么星座| 怀孕皮肤变差什么原因| 皮下紫癜是什么引起的| 派出所什么时候上班| 蓝瘦香菇是什么意思| 金匮肾气丸主治什么病| 高血钾有什么症状| 家里停电了打什么电话| fox什么意思| 声音的高低叫什么| 鹅口疮是什么引起的| 火把节在每年农历的什么时间举行| 利益最大化是什么意思| 杠杆是什么意思| 肾结石都有什么症状| 额头有痣代表什么| 花序是什么意思| 宫外孕是什么导致的| 腰疼是什么原因引起的| 饮食不规律会导致什么| 果酸是什么东西| 咳嗽喝什么汤| 楞严神咒是什么意思| 双肺斑索是什么意思| 小孩血压低是什么原因| 尚书是什么官| 奎字五行属什么| 每天起床口苦口臭是什么原因| 吓着了有什么症状| 新生儿囟门什么时候闭合| 汗液里面有什么成分| 劝君更尽一杯酒的下一句是什么| 喉咙老是有白痰是什么原因| 查血糖是什么检查项目| 大便常规检查能查出什么| 高钾血症是什么原因引起的| 早晨起来手肿是什么原因| 静脉曲张看什么科| 属猴是什么命| 睡眠不好用什么泡脚助于睡眠| pu皮是什么材质| 股市pe是什么意思| 马来西亚说什么语言| 韭菜不能和什么一起吃| 饭后烧心是什么原因引起的| 生育保险是什么意思| 夏花是什么意思| 偶发室上性早搏是什么意思| sunny是什么意思| 炎症反应性细胞改变是什么意思| 脾脏是人体的什么器官| 拉伤筋用什么药好| 生脉饮适合什么人喝| 来姨妈不能吃什么水果| 菊花和枸杞泡水喝有什么功效| 膝关节咔咔响是什么原因| 入围是什么意思| 天秤座跟什么星座最配| 莲子是什么| 1893年属什么| 1987年是什么年| 亦金读什么| 过什么不什么| 早餐吃什么有营养| 云吞是什么| 什么东西补钙| 什么是hp感染| 尿频是什么原因导致的| 一个草字头一个见念什么| 药食同源什么意思| 大于90度的角是什么角| 1959属什么生肖| 鼻塞有脓鼻涕吃什么药| 总师是什么级别| 久而久之下一句是什么| 1982属什么生肖| 感知力是什么意思| 单独玉米粉能做什么| 鸡汤用什么鸡| 拉肚子不能吃什么食物| 便秘吃什么药快速排便| 生孩子大出血是什么原因造成的| 白兰地是什么酒| 长此以往什么意思| 什么是借读生| 什么时候用得| 樱桃什么时候成熟| 什么的落日| 抽血能检查出什么| 芦荟有什么作用| 尿路感染是什么原因造成的| 吃什么能排结石| h皮带是什么牌子| 什么什么泪下| 白带是什么| 岫岩玉是什么玉| 奶嚼口是什么| 传媒公司是干什么的| 舌苔发白是什么原因引起的| 什么然泪下| 脖子为什么有颈纹| 挂红是什么意思| 5月21日是什么星座| 但求无愧于心上句是什么| 糖醋排骨是什么菜系| 什么是射频消融术| 大便隐血阳性是什么意思| 胆固醇偏高有什么危害| 什么是失信被执行人| 肺部玻璃结节是什么病| 手指关节疼痛是什么原因| b群链球菌是什么意思| 核桃壳有什么用| 婴儿增强免疫力吃什么| 复方板蓝根和板蓝根有什么区别| 烫伤用什么药膏好| 1129是什么星座| 肾不好会有什么症状| 环切是什么意思| 病是什么结构的字| 车厘子与樱桃有什么区别| 黄瓜为什么是绿色的| 狗狗冠状是什么症状| 红黑相间的蛇是什么蛇| 什么样的花朵| 什么水果对嗓子好| 魔芋是什么东西| 错综复杂是什么意思| 白带多用什么药| 硫黄是什么| cro是什么意思| 肾囊肿有什么症状表现| 为什么蛋皮会痒| 批发零售属于什么行业| 急性胃肠炎用什么药| 胃角在什么位置图片| 氧分压低是什么原因| 什么是细菌感染| 王八羔子是什么意思| take是什么意思| 体悟是什么意思| 舅子是什么意思| 什么花一年四季都开| hr是什么| 带id是什么意思| 11.28什么星座| 金童玉女指什么生肖| 猪脚和猪蹄有什么区别| 护士长是什么级别| 射精无力吃什么药好| 甲母痣是什么| 血脂异常是什么意思| mrcp检查是什么意思| 女人脑供血不足吃什么| 肝腹水有什么症状| 胸膜炎是什么病| hr什么意思| 10月31日什么星座| 爱慕内衣什么档次| 慷慨解囊是什么意思| 什么花秋天开| 本科专科有什么区别| 笑得什么| 12颗珠子的手串什么意思| 牡丹是什么季节开的| 令坦是对方什么人的尊称| 清热去湿热颗粒有什么功效| 故作矜持的意思是什么| 什么的高楼| 谷胱甘肽是什么| 尿蛋白高是什么病| 6.21什么星座| 球镜是什么| 煮黑豆吃有什么功效| 韦编三绝是什么意思| 显赫是什么意思| 鬼针草长什么样| 酒后吐吃什么可以缓解| 证明是什么意思| 太监是什么生肖| 什么的走路| 检测毛囊去什么医院| 洛五行属性是什么| 慎独是什么意思| 分化是什么意思| 陀螺是什么意思| 89年是什么年| 气血不足吃什么食物最好| 什么牌子的电动车好| 死精是什么样的颜色| 孕妇地中海贫血对胎儿有什么影响| 为什么会眼压高| npc是什么意思| 恩施玉露属于什么茶| 百合有什么功效和作用| c2可以开什么车| 胎儿右肾盂分离是什么意思| 甘油三酯高有什么危害| 血糖高怎么办吃什么好| 做梦梦到牛是什么意思| 白细胞介素是什么| 在什么中间| 五十知天命是什么意思| 呕吐发烧是什么原因| 过敏性紫癜看什么科| 五指毛桃长什么样| 青光眼是什么症状| 热得什么| 什么方什么计| 一什么永什么成语| 孙膑原名叫什么| 白喉是什么病| 七月一号什么星座| 九月24日是什么星座| 月经来吃什么水果好| 百度Jump to content

腾讯大燕网:限行时间延长至21点 末班公交到几点?

From Wikipedia, the free encyclopedia
百度   毛泽东最后一次坐飞机。

Burrows–Abadi–Needham logic (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols. Specifically, BAN logic helps its users determine whether exchanged information is trustworthy, secured against eavesdropping, or both. BAN logic starts with the assumption that all information exchanges happen on media vulnerable to tampering and public monitoring. This has evolved into the popular security mantra, "Don't trust the network."

A typical BAN logic sequence includes three steps:[1]

  1. Verification of message origin
  2. Verification of message freshness
  3. Verification of the origin's trustworthiness.

BAN logic uses postulates and definitions – like all axiomatic systems – to analyze authentication protocols. Use of the BAN logic often accompanies a security protocol notation formulation of a protocol and is sometimes given in papers.

Language type

[edit]

BAN logic, and logics in the same family, are decidable: there exists an algorithm taking BAN hypotheses and a purported conclusion, and that answers whether or not the conclusion is derivable from the hypotheses. The proposed algorithms use a variant of magic sets.[2]

Alternatives and criticism

[edit]

BAN logic inspired many other similar formalisms, such as GNY logic. Some of these try to repair one weakness of BAN logic: the lack of a good semantics with a clear meaning in terms of knowledge and possible universes. However, starting in the mid-1990s, crypto protocols were analyzed in operational models (assuming perfect cryptography) using model checkers, and numerous bugs were found in protocols that were "verified" with BAN logic and related formalisms. [citation needed] In some cases a protocol was reasoned as secure by the BAN analysis but were in fact insecure.[3] This has led to the abandonment of BAN-family logics in favor of proof methods based on standard invariance reasoning. [citation needed]

Basic rules

[edit]

The definitions and their implications are below (P and Q are network agents, X is a message, and K is an encryption key):

  • P believes X: P acts as if X is true, and may assert X in other messages.
  • P has jurisdiction over X: P's beliefs about X should be trusted.
  • P said X: At one time, P transmitted (and believed) message X, although P might no longer believe X.
  • P sees X: P receives message X, and can read and repeat X.
  • {X}K: X is encrypted with key K.
  • fresh(X): X has not previously been sent in any message.
  • key(K, P?Q): P and Q may communicate with shared key K

The meaning of these definitions is captured in a series of postulates:

  • If P believes key(K, P?Q), and P sees {X}K, then P believes (Q said X)
  • If P believes (Q said X) and P believes fresh(X), then P believes (Q believes X).

P must believe that X is fresh here. If X is not known to be fresh, then it might be an obsolete message, replayed by an attacker.

  • If P believes (Q has jurisdiction over X) and P believes (Q believes X), then P believes X
  • There are several other technical postulates having to do with composition of messages. For example, if P believes that Q said ?X, Y?, the concatenation of X and Y, then P also believes that Q said X, and P also believes that Q said Y.

Using this notation, the assumptions behind an authentication protocol can be formalized. Using the postulates, one can prove that certain agents believe that they can communicate using certain keys. If the proof fails, the point of failure usually suggests an attack which compromises the protocol.

BAN logic analysis of the Wide Mouth Frog protocol

[edit]

A very simple protocol – the Wide Mouth Frog protocol – allows two agents, A and B, to establish secure communications, using a trusted authentication server, S, and synchronized clocks all around. Using standard notation the protocol can be specified as follows:

AS: A, {TA, KAB, B}KAS
SB: {TS, KAB, A}KBS

Agents A and B are equipped with keys KAS and KBS, respectively, for communicating securely with S. So we have assumptions:

A believes key(KAS, A?S)
S believes key(KAS, A?S)
B believes key(KBS, B?S)
S believes key(KBS, B?S)

Agent A wants to initiate a secure conversation with B. It therefore invents a key, KAB, which it will use to communicate with B. A believes that this key is secure, since it made up the key itself:

A believes key(KAB, A?B)

B is willing to accept this key, as long as it is sure that it came from A:

B believes (A has jurisdiction over key(K, A?B))

Moreover, B is willing to trust S to accurately relay keys from A:

B believes (S has jurisdiction over (A believes key(K, A?B)))

That is, if B believes that S believes that A wants to use a particular key to communicate with B, then B will trust S and believe it also.

The goal is to have

B believes key(KAB, A?B)

A reads the clock, obtaining the current time t, and sends the following message:

1 AS: {t, key(KAB, A?B)}KAS

That is, it sends its chosen session key and the current time to S, encrypted with its private authentication server key KAS.

Since S believes that key(KAS, A?S), and S sees {t, key(KAB, A?B)}KAS, then S concludes that A actually said {t, key(KAB, A?B)}. (In particular, S believes that the message was not manufactured out of whole cloth by some attacker.)

Since the clocks are synchronized, we can assume

S believes fresh(t)

Since S believes fresh(t) and S believes A said {t, key(KAB, A?B)}, S believes that A actually believes that key(KAB, A?B). (In particular, S believes that the message was not replayed by some attacker who captured it at some time in the past.)

S then forwards the key to B:

2 SB: {t, A, A believes key(KAB, A?B)}KBS

Because message 2 is encrypted with KBS, and B believes key(KBS, B?S), B now believes that S said {t, A, A believes key(KAB, A?B)}. Because the clocks are synchronized, B believes fresh(t), and so fresh(A believes key(KAB, A?B)). Because B believes that S's statement is fresh, B believes that S believes that (A believes key(KAB, A?B)). Because B believes that S is authoritative about what A believes, B believes that (A believes key(KAB, A?B)). Because B believes that A is authoritative about session keys between A and B, B believes key(KAB, A?B). B can now contact A directly, using KAB as a secret session key.

Now let's suppose that we abandon the assumption that the clocks are synchronized. In that case, S gets message 1 from A with {t, key(KAB, A?B)}, but it can no longer conclude that t is fresh. It knows that A sent this message at some time in the past (because it is encrypted with KAS) but not that this is a recent message, so S doesn't believe that A necessarily wants to continue to use the key KAB. This points directly at an attack on the protocol: An attacker who can capture messages can guess one of the old session keys KAB. (This might take a long time.) The attacker then replays the old {t, key(KAB, A?B)} message, sending it to S. If the clocks aren't synchronized (perhaps as part of the same attack), S might believe this old message and request that B use the old, compromised key over again.

The original Logic of Authentication paper (linked below) contains this example and many others, including analyses of the Kerberos handshake protocol, and two versions of the Andrew Project RPC handshake (one of which is defective).

References

[edit]
  1. ^ "Course material on BAN logic" (PDF). UT Austin CS.
  2. ^ Monniaux, David (1999). "Decision procedures for the analysis of cryptographic protocols by logics of belief". Proceedings of the 12th IEEE Computer Security Foundations Workshop. pp. 44–54. doi:10.1109/CSFW.1999.779761. ISBN 0-7695-0201-6. S2CID 11283134.
  3. ^ Boyd, Colin; Mao, Wenbo (1994). "On a limitation of BAN logic". EUROCRYPT '93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology. pp. 240–247. ISBN 9783540576006. Retrieved 2025-08-14.

Further reading

[edit]
石榴什么时候成熟 病案号是什么 胃痛胃胀什么原因引起的 夕阳什么意思 泡脚什么时候泡最好
甲状腺球蛋白低是什么原因 7月6日什么星座 初级中学是什么意思 熳是什么意思 吃什么水果可以减肥
口干口臭口苦吃什么药 吃什么排黑色素最强 水煮鱼一般用什么鱼 浓度是什么意思 晚8点是什么时辰
薄谷开来为什么杀人 低钠有什么症状和危害 大拇指脱皮是什么原因 减肥吃什么东西 伸筋草主治什么病
胃不舒服吃什么药好hcv9jop5ns3r.cn 手心干燥是什么原因hcv8jop6ns5r.cn 2017年属鸡的是什么命1949doufunao.com 更年期吃什么药好hcv8jop6ns3r.cn 孕妇喝什么牛奶好hcv8jop4ns5r.cn
小腿抽筋吃什么药dayuxmw.com 癫痫是什么症状hcv9jop2ns1r.cn 煸是什么意思hcv8jop8ns2r.cn 脉动是什么意思hcv8jop8ns0r.cn 激素六项什么时候查最准hcv8jop2ns8r.cn
浇去掉三点水读什么ff14chat.com 四十岁月经量少是什么原因hcv9jop5ns7r.cn 脚臭用什么药最好hcv8jop5ns2r.cn 老子是什么时期的人chuanglingweilai.com 男士适合戴什么手串hcv8jop7ns4r.cn
公务员是什么编制hcv8jop4ns1r.cn 小孩什么时候长牙hcv9jop6ns2r.cn 嘴唇不红润是什么原因hcv9jop6ns1r.cn 吊孝是什么意思hcv7jop7ns1r.cn 骁字五行属什么hcv7jop9ns3r.cn
百度